April 16, 2015

5 Factors to Retrospect after Every Sprint while Developing a Product
The essence of agile is to thrive for continuous improvement through empirical process control. True agile teams find ways to improve through experimentation, finding sustainability, and delivering business value earlier. It is a never-ending journey, and a sprint retrospective emerges as an opportunity to further accelerate this improvement process. It is a great time to allocate and analyse extraneous factors in detail, which otherwise may distract the team’s focus. In this post, we highlight 5 factors which every agile team should retrospect after each sprint. Let’s have a look.


Combining SIAM and DevOps for Digital Reimagination
Some of the most important aspects of the SIAM role are the coordination of people, processes, technology and data, and the governance across multiple suppliers, to ensure effective and efficient operations of the end-to-end service delivery to the business user. DevOps and SIAM converge in addressing current business and IT challenges and targeting people and attitude as primary drivers of performance and value. Whilst DevOps addresses the cons of functional specialisation and the spread of responsibilities across different IT teams, SIAM deals with the additional challenge of spreading services across multiple vendors.


Free ebook: Microsoft Azure Essentials: Azure Machine Learning
This ebook will present an overview of modern data science theory and principles, the associated workflow, and then cover some of the more common machine learning algorithms in use today. We will build a variety of predictive analytics models using real world data, evaluate several different machine learning algorithms and modeling strategies, and then deploy the finished models as machine learning web service on Azure within a matter of minutes. The book will also expand on a working Azure Machine Learning predictive model example to explore the types of client and server applications you can create to consume Azure Machine Learning web services.


Lack of skilled infosec pros creates high-risk environments
A portrait of the ideal cybersecurity professional emerges from this list of shortfalls: the top three attributes are a formal education, practical experience and certifications. The study reveals that organizations are experiencing attacks that are largely deliberate, and they lack confidence in the ability of their staff. The top four threat actors exploiting organizations in 2014 were cybercriminals (46 percent), non-malicious insiders (41 percent), hackers (40 percent) and malicious insiders (29 percent). 64 percent are very concerned or concerned about the Internet of Things, and less than half feel their security teams are able to detect and respond to complex incidents.


How The Internet of Things Is a Transformational Opportunity
Internet of Things looks like a massive opportunity over the years ahead, there are already many practical and valuable applications, and everything seems to be indicating that we are just in the first stages of what could be a game-changing series of innovations. However, opportunity attracts competition, and IBM will need to compete against several big players trying to get a piece of the pie. In January 2014 Google invested $3.2 billion in the acquisition of Nest Labs, a leading player in smart thermostats and smoke alarms. This means Google invested more in a single purchase than IBM over the coming four years in its whole Internet of Things initiative.


Will containers kill the virtual machine?
Containers are not a new technology: the earliest iterations of containers have been around in open source Linux code for decades. But in the past year they've captured the hearts and minds of many developers for building and running applications. Containers isolate specific code, applications or processes. Doing so gives whatever is inside the container a neat envelope for managing it, including moving it across various hosts. Whereas you can think of a virtual machine slicing up a server into multiple operating systems, containers run atop the OS so unlike a VM, they don't require an OS to boot up when they're created. In essence they can virtualize an operating system to provide a more lightweight package of an application compared to a VM.


SSL/TLS/HTTPS: Keeping the public uninformed
Perhaps the most important thing to understand about the SSL/TLS/HTTPS system that secures websites is that you are not supposed to understand it. ... If SSL/TLS/HTTPS was reallydesigned for security, this would have been done long ago. But secure websites are security theater. They seem to be secure, techies say they are secure (at least in public), but the system is flawed. That it took so long to expose Superfish was because the system is rigged against normal folks. Jonathan Zdziarski recently made another simple suggestion that, like mine, will never see the light of day. He points out that HTTPS interception, such as Superfish, can be detected if the web browser notices that the last X "secure" websites were all vouched for by the same Certificate Authority.


SEC’s Stein touches all the bases in discussion on data, technology
With a goal of collecting an estimated 58 million records per day, there is little doubt that CAT will require a tremendous amount of industry cooperation. However, Stein pointed out that a proposal that might seem like a regulatory reform wrought with headaches for the industry might eventually simplify the work of compliance professionals. “Only though CAT can we develop regulations that are driven by the facts,” Stein explained. Stein touched on how the Flash Crash and the lengthy investigation that followed highlighted the need for CAT and lamented the slow march to implementation, which remains years away. “We need the CAT as soon as possible,” Stein said.


Infosec taking the strain as threats evolve and skills gap widens
Davis added it may also indicate that information security professionals in Germany have a higher level of top executive support than in the UK and elsewhere in Europe. Despite budgets allowing for more personnel, 62% of respondents reported that their organisations have too few information security professionals – up from 56% in 2013. Frost & Sullivan estimates that the global workforce shortage will widen to 1.5 million in five years, while the variety and sophistication of cyber threats are expected to continue. The situation is exacerbated by the broadening footprint of systems and devices requiring security oversight. Signs of strain, including configuration mistakes and oversights, were identified as a significant concern, and recovery time following system or data compromises was found to be getting steadily longer.


Why CIOs can’t sell enterprise collaboration tools
One of the biggest challenges is determining how to implement enterprise collaboration in cross-functional manner, says John Abel, senior vice president of IT at Hitachi Data Systems, “Teams are pretty good at communicating within their own group but when it comes to integrating across departments silos tend to happen, which ultimately becomes problematic when each team needs to align on certain campaigns or key topics,” he says. NetScout’s CIO and Senior Vice President of Services Ken Boyd says the landscape of collaboration tools available today makes it difficult to pick the best ones for a specific workforce. “Locating a collaboration tools provider that can offer the right balance for the needs of our enterprise users can be a significant challenge,” he says.



Quote for the day:

“...A man can only stumble for so long before he either falls or stands up straight.” -- Brandon Sanderson